Vulnerabilities > Jfrog > Artifactory

DATE CVE VULNERABILITY TITLE RISK
2019-04-16 CVE-2018-19971 Insufficient Verification of Data Authenticity vulnerability in Jfrog Artifactory 6.5.9
JFrog Artifactory Pro 6.5.9 has Incorrect Access Control.
network
low complexity
jfrog CWE-345
critical
9.8
2019-04-11 CVE-2019-9733 Unspecified vulnerability in Jfrog Artifactory 6.7.3
An issue was discovered in JFrog Artifactory 6.7.3.
network
low complexity
jfrog
critical
9.8
2019-01-09 CVE-2018-1000424 Insufficiently Protected Credentials vulnerability in Jfrog Artifactory
An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin.
local
low complexity
jfrog CWE-522
7.8
2018-07-13 CVE-2018-1000206 Cross-Site Request Forgery (CSRF) vulnerability in Jfrog Artifactory
JFrog Artifactory version since 5.11 contains a Cross ite Request Forgery (CSRF) vulnerability in UI rest endpoints that can result in Classic CSRF attack allowing an attacker to perform actions as logged in user.
network
low complexity
jfrog CWE-352
8.8
2018-07-09 CVE-2018-1000623 Path Traversal vulnerability in Jfrog Artifactory
JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The "Import Repository from Zip" feature, available through the Admin menu -> Import & Export -> Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution.
network
low complexity
jfrog CWE-22
7.2
2018-05-01 CVE-2016-10036 Unrestricted Upload of File with Dangerous Type vulnerability in Jfrog Artifactory
Unrestricted file upload vulnerability in ui/artifact/upload in JFrog Artifactory before 4.16 allows remote attackers to (1) deploy an arbitrary servlet application and execute arbitrary code by uploading a war file or (2) possibly write to arbitrary files and cause a denial of service by uploading an HTML file.
network
low complexity
jfrog CWE-434
critical
9.8
2016-12-09 CVE-2016-6501 Improper Input Validation vulnerability in Jfrog Artifactory
JFrog Artifactory before 4.11 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
network
low complexity
jfrog CWE-20
critical
9.8